Sciweavers

9842 search results - page 1815 / 1969
» Compositional timing analysis
Sort
View
TOMACS
2011
139views more  TOMACS 2011»
13 years 5 months ago
The double CFTP method
We consider the problem of the exact simulation of random variables Z that satisfy the distributional identity Z L = V Y + (1 − V )Z, where V ∈ [0, 1] and Y are independent, an...
Luc Devroye, Lancelot F. James
WWW
2011
ACM
13 years 5 months ago
we.b: the web of short urls
Short URLs have become ubiquitous. Especially popular within social networking services, short URLs have seen a significant increase in their usage over the past years, mostly du...
Demetres Antoniades, Iasonas Polakis, Georgios Kon...
EJASP
2010
166views more  EJASP 2010»
13 years 5 months ago
Decoding Schemes for FBMC with Single-Delay STTC
Orthogonally multiplexed Quadrature Amplitude Modulation (O-QAM) with Filter Banks based Multi Carrier modulation (FBMC) is a multi-carrier modulation scheme that can be considere...
Chrislin Lélé, Didier Le Ruyet
NAR
2010
165views more  NAR 2010»
13 years 5 months ago
PhosPhAt: the Arabidopsis thaliana phosphorylation site database. An update
: Growth and development of plants depends on uptake and assimilation of nutrients. Many assimilation products of macronutrients are not only essential for plant growth but also ha...
Pawel Durek, Robert Schmidt, Joshua L. Heazlewood,...
SOICT
2010
13 years 5 months ago
Password recovery for encrypted ZIP archives using GPUs
Protecting data by passwords in documents such as DOC, PDF or RAR, ZIP archives has been demonstrated to be weak under dictionary attacks. Time for recovering the passwords of suc...
Pham Hong Phong, Phan Duc Dung, Duong Nhat Tan, Ng...
« Prev « First page 1815 / 1969 Last » Next »